[ALPINE:CVE-2023-50269] squid vulnerability
Severity
High
Affected Packages
8
Fixed Packages
8
CVEs
1
[From CVE-2023-50269] Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.
Package | Affected Version |
---|---|
pkg:apk/alpine/squid?arch=x86_64&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=x86&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=s390x&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=riscv64&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=ppc64le&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=armv7&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=armhf&distro=alpine-edge | < 6.6-r0 |
pkg:apk/alpine/squid?arch=aarch64&distro=alpine-edge | < 6.6-r0 |
- ID
- ALPINE:CVE-2023-50269
- Severity
- high
- Severity from
- CVE-2023-50269
- URL
- https://security.alpinelinux.org/vuln/CVE-2023-50269
- Published
-
2023-12-14T18:15:45
(9 months ago) - Modified
-
2023-12-14T18:15:45
(9 months ago) - Rights
- Alpine Linux Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Fixed | pkg:apk/alpine/squid?arch=x86_64&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | x86_64 | |
Affected | pkg:apk/alpine/squid?arch=x86_64&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | x86_64 | |
Fixed | pkg:apk/alpine/squid?arch=x86&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | x86 | |
Affected | pkg:apk/alpine/squid?arch=x86&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | x86 | |
Fixed | pkg:apk/alpine/squid?arch=s390x&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | s390x | |
Affected | pkg:apk/alpine/squid?arch=s390x&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | s390x | |
Fixed | pkg:apk/alpine/squid?arch=riscv64&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | riscv64 | |
Affected | pkg:apk/alpine/squid?arch=riscv64&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | riscv64 | |
Fixed | pkg:apk/alpine/squid?arch=ppc64le&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | ppc64le | |
Affected | pkg:apk/alpine/squid?arch=ppc64le&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | ppc64le | |
Fixed | pkg:apk/alpine/squid?arch=armv7&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | armv7 | |
Affected | pkg:apk/alpine/squid?arch=armv7&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | armv7 | |
Fixed | pkg:apk/alpine/squid?arch=armhf&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | armhf | |
Affected | pkg:apk/alpine/squid?arch=armhf&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | armhf | |
Fixed | pkg:apk/alpine/squid?arch=aarch64&distro=alpine-edge | alpine | squid | = 6.6-r0 | alpine-edge | aarch64 | |
Affected | pkg:apk/alpine/squid?arch=aarch64&distro=alpine-edge | alpine | squid | < 6.6-r0 | alpine-edge | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |